CSM to Xcat Transition On

Total Page:16

File Type:pdf, Size:1020Kb

CSM to Xcat Transition On Front cover Configuring and Managing AIX Clusters Using xCAT 2 An xCAT guide for CSM system administrators with advanced features How to transition your AIX cluster to xCAT xCAT 2 deployment guide for a new AIX cluster Octavian Lascu Tim Donovan Saul Hiller Simeon McAleer László Niesz Sean Saunders Kai Wu Peter Zutenis ibm.com/redbooks International Technical Support Organization Configuring and Managing AIX Clusters Using xCAT 2 October 2009 SG24-7766-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (October 2009) This edition applies to Version 2, Release 2, Modification 1 of Extreme Cluster Administration Tool (xCAT 2) for AIX. © Copyright International Business Machines Corporation 2009. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Become a published author . xiii Comments welcome. xiv Part 1. Introduction . 1 Chapter 1. Introduction to clustering . 3 1.1 Clustering concepts. 4 1.1.1 Cluster types . 4 1.1.2 Cluster components . 5 1.1.3 Cluster nodes . 7 1.1.4 Cluster networks . 9 1.1.5 Hardware, power control, and console access . 11 1.2 Suggested cluster diagram . 13 1.3 Managing high performance computing (HPC) clusters . 15 1.3.1 What is CSM . 15 1.3.2 xCAT 2: An 0pen source method for cluster management . 16 1.3.3 xCAT 1.1.4 and CSM to xCAT 2 - History and evolution . 17 1.3.4 IBM (Systems) Director vs. xCAT 2 . 18 Chapter 2. xCAT 2 architecture . 21 2.1 Overview of xCAT 2 features . 22 2.1.1 Operating systems and distributions supported . 23 2.1.2 Supported hardware . 24 2.1.3 Hardware control. 24 2.1.4 Hierarchical clusters . 25 2.2 Overview of the xCAT 2 architecture. 26 2.2.1 xCAT 2 database . 28 2.2.2 xCAT 2 directory structure . 30 2.2.3 xCAT network fundamentals . 31 2.2.4 Monitoring infrastructure . 33 2.2.5 Parallel remote command execution and file copy, File Sync. 37 2.2.6 Additional features . 38 2.3 Support offering terms. 39 © Copyright IBM Corp. 2009. All rights reserved. iii Chapter 3. CSM and xCAT functional comparison. 41 3.1 Architectural comparison. 42 3.1.1 Hierarchical versus flat . 42 3.1.2 Modular structure . 42 3.1.3 Database. 43 3.1.4 Notification infrastructure . 44 3.1.5 Deploying both diskless and diskful nodes . 44 3.1.6 Automatic setup of services . 44 3.1.7 Role-based system administration . 44 3.1.8 Dynamic nodegroups . 44 3.1.9 Secondary adapters . 45 3.1.10 RMC monitoring . 45 3.2 Features . 54 3.3 Hardware and software considerations . 55 3.4 Hardware considerations. 55 3.5 SW considerations . 55 3.6 Database . 56 3.7 Administrative task comparison. 59 3.7.1 Table comparing functionality . 59 3.7.2 Comparison of common admin commands. 62 Part 2. Implementation . 69 Chapter 4. CSM to xCAT 2 transition . 71 4.1 Introduction to implementation scenarios . 72 4.1.1 Hardware. 72 4.1.2 Software . 72 4.1.3 Test environment diagram . 73 4.1.4 Scenarios description . 73 4.2 Preparing your CSM cluster for transition . 76 4.2.1 Things to check before the transition . 76 4.2.2 Remote shell/copy back-end considerations. 78 4.2.3 Backing up CSM data . 78 4.2.4 Saving secondary adapter information . 82 4.2.5 Save RMC monitoring data . 83 4.3 Transitioning nodes to a different MN . 84 4.3.1 Preparing the xCAT 2 management node (MN) for transition. 84 4.3.2 Gather CSM data using the csm2xcat script on CSM MS . 89 4.3.3 Update /etc/hosts . 90 4.3.4 Set up user and group on the new xCAT MN . 90 4.3.5 Configure remote shell . 91 4.3.6 Check the ulimit. 91 4.3.7 Enabling NTP . 92 iv Configuring and Managing AIX Clusters Using xCAT 2 4.3.8 Enabling inetd entries . 92 4.3.9 Define HMC and VIO servers in xCAT . 93 4.3.10 Discovering HW in xCAT (rscan) . 94 4.3.11 Defining the nodes (populating the tables) . 94 4.3.12 Configuring and testing conserver . 99 4.3.13 Testing remote power control (rpower) . 100 4.3.14 Configuring NIM master and creating NIM resources . 100 4.3.15 Add installp bundles to xCAT osimage . 102 4.3.16 Define xCAT networks . 102 4.3.17 Create NIM secondary adapter definitions . 102 4.3.18 Creating NIM client and group definitions . 103 4.3.19 Removing nodes from the NIM configuration on CSM MS . 105 4.3.20 Register the nodes with the new xCAT NIM master . 105 4.3.21 Install xCAT dependency packages on the client nodes. 106 4.3.22 Removing the nodes from CSM . 107 4.3.23 Setting up syslog. 109 4.3.24 Prepare SSH keys for distribution to the nodes . 109 4.3.25 Run the xcataixscript utility on the nodes . 109 4.3.26 Configure and run postscripts with updatenode . ..
Recommended publications
  • An Introduction to Security in a CSM 1.3 for AIX 5L Environment
    Front cover An Introduction to Security in a CSM 1.3 for AIX 5L Environment Peek at the latest security mechanisms for pSeries clusters Practical security considerations included Security concepts and components explained Octavian Lascu Rashid Sayed Stuart Carroll Teresa Coleman Maik Haehnel Petr Klabenes Dino Quintero Rogelio Reyes, Jr. Mizuho Tanaka David Duy Truong ibm.com/redbooks International Technical Support Organization An Introduction to Security in a CSM 1.3 for AIX 5L Environment December 2002 SG24-6873-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2002) This edition applies to Version 1, Release 3, of IBM Cluster Systems Management for use with the AIX operating system Version 5, Release 2. © Copyright International Business Machines Corporation 2002. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Notices . .ix Trademarks . x Preface . .xi The team that wrote this redbook. .xi Become a published author . xiii Comments welcome. xiii Chapter 1. Introduction . 1 1.1 Security overview . 2 1.1.1 System security. 2 1.1.2 Network security basics . 3 1.1.3 Data transmission security . 4 1.2 Cluster Systems Management security basics . 5 1.2.1 Reliable Scalable Cluster Technology (RSCT) . 6 1.2.2 Resource Monitoring and Control (RMC) . 6 1.2.3 Resource managers (RM). 7 1.2.4 Cluster Security Services (CtSec). 7 1.2.5 Group Services and Topology Services . 8 Chapter 2.
    [Show full text]
  • Loadleveler: Using and Administering
    IBM LoadLeveler Version 5 Release 1 Using and Administering SC23-6792-04 IBM LoadLeveler Version 5 Release 1 Using and Administering SC23-6792-04 Note Before using this information and the product it supports, read the information in “Notices” on page 423. This edition applies to version 5, release 1, modification 0 of IBM LoadLeveler (product numbers 5725-G01, 5641-LL1, 5641-LL3, 5765-L50, and 5765-LLP) and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces SC23-6792-03. © Copyright 1986, 1987, 1988, 1989, 1990, 1991 by the Condor Design Team. © Copyright IBM Corporation 1986, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ..............vii LoadLeveler for AIX and LoadLeveler for Linux compatibility ..............35 Tables ...............ix Restrictions for LoadLeveler for Linux ....36 Features not supported in LoadLeveler for Linux 36 Restrictions for LoadLeveler for AIX and About this information ........xi LoadLeveler for Linux mixed clusters ....36 Who should use this information .......xi Conventions and terminology used in this information ..............xi Part 2. Configuring and managing Prerequisite and related information ......xii the LoadLeveler environment . 37 How to send your comments ........xiii Chapter 4. Configuring the LoadLeveler Summary of changes ........xv environment ............39 The master configuration file ........40 Part 1. Overview of LoadLeveler Setting the LoadLeveler user .......40 concepts and operation .......1 Setting the configuration source ......41 Overriding the shared memory key .....41 File-based configuration ..........42 Chapter 1. What is LoadLeveler? ....3 Database configuration option ........43 LoadLeveler basics ............4 Understanding remotely configured nodes .
    [Show full text]
  • Université De Montréal Low-Impact Operating
    UNIVERSITE´ DE MONTREAL´ LOW-IMPACT OPERATING SYSTEM TRACING MATHIEU DESNOYERS DEPARTEMENT´ DE GENIE´ INFORMATIQUE ET GENIE´ LOGICIEL ECOLE´ POLYTECHNIQUE DE MONTREAL´ THESE` PRESENT´ EE´ EN VUE DE L’OBTENTION DU DIPLOMEˆ DE PHILOSOPHIÆ DOCTOR (Ph.D.) (GENIE´ INFORMATIQUE) DECEMBRE´ 2009 c Mathieu Desnoyers, 2009. UNIVERSITE´ DE MONTREAL´ ECOL´ E POLYTECHNIQUE DE MONTREAL´ Cette th`ese intitul´ee : LOW-IMPACT OPERATING SYSTEM TRACING pr´esent´ee par : DESNOYERS Mathieu en vue de l’obtention du diplˆome de : Philosophiæ Doctor a ´et´edˆument accept´ee par le jury constitu´ede : Mme. BOUCHENEB Hanifa, Doctorat, pr´esidente M. DAGENAIS Michel, Ph.D., membre et directeur de recherche M. BOYER Fran¸cois-Raymond, Ph.D., membre M. STUMM Michael, Ph.D., membre iii I dedicate this thesis to my family, to my friends, who help me keeping balance between the joy of sharing my work, my quest for knowledge and life. Je d´edie cette th`ese `ama famille, `ames amis, qui m’aident `aconserver l’´equilibre entre la joie de partager mon travail, ma quˆete de connaissance et la vie. iv Acknowledgements I would like to thank Michel Dagenais, my advisor, for believing in my poten- tial and letting me explore the field of operating systems since the beginning of my undergraduate studies. I would also like to thank my mentors, Robert Wisniewski from IBM Research and Martin Bligh, from Google, who have been guiding me through the internships I have done in the industry. I keep a good memory of these experiences and am honored to have worked with them. A special thanks to Paul E.
    [Show full text]
  • Installation Procedures for Clusters
    Moreno Baricevic CNR-IOM DEMOCRITOS Trieste, ITALY InstallationInstallation ProceduresProcedures forfor ClustersClusters PART 3 – Cluster Management Tools and Security AgendaAgenda Cluster Services Overview on Installation Procedures Configuration and Setup of a NETBOOT Environment Troubleshooting ClusterCluster ManagementManagement ToolsTools NotesNotes onon SecuritySecurity Hands-on Laboratory Session 2 ClusterCluster managementmanagement toolstools CLUSTERCLUSTER MANAGEMENTMANAGEMENT AdministrationAdministration ToolsTools Requirements: ✔ cluster-wide command execution ✔ cluster-wide file distribution and gathering ✔ password-less environment ✔ must be simple, efficient, easy to use for CLI addicted 4 CLUSTERCLUSTER MANAGEMENTMANAGEMENT AdministrationAdministration ToolsTools C3 tools – The Cluster Command and Control tool suite allows configurable clusters and subsets of machines concurrently execution of commands supplies many utilities cexec (parallel execution of standard commands on all cluster nodes) cexecs (as the above but serial execution, useful for troubleshooting and debugging) cpush (distribute files or directories to all cluster nodes) cget (retrieves files or directory from all cluster nodes) crm (cluster-wide remove) ... and many more PDSH – Parallel Distributed SHell same features as C3 tools, few utilities pdsh, pdcp, rpdcp, dshbak Cluster-Fork – NPACI Rocks serial execution only ClusterSSH multiple xterm windows handled through one input grabber Spawn an xterm for each node! DO NOT EVEN TRY IT ON A LARGE CLUSTER!
    [Show full text]
  • Bare Metal Provisioning to Openstack Using Xcat
    JOURNAL OF COMPUTERS, VOL. 8, NO. 7, JULY 2013 1691 Bare Metal Provisioning to OpenStack Using xCAT Jun Xie Network Information Center, BUPT, Beijing, China Email: [email protected] Yujie Su, Zhaowen Lin, Yan Ma and Junxue Liang Network Information Center, BUPT, Beijing, China Email: {suyj, linzw, mayan, liangjx}@bupt.edu.cn Abstract—Cloud computing relies heavily on virtualization mainly built on virtualization technologies (Xen, KVM, technologies. This also applies to OpenStack, which is etc.). currently the most popular IaaS platform; it mainly provides virtual machines to cloud end users. However, B. Motivation virtualization unavoidably brings some performance The adoption of virtualization in cloud environment penalty, contrasted with bare metal provisioning. In this has resulted in great benefits, however, this has not been paper, we present our approach for extending OpenStack to without attendant problems,such as unresponsive support bare metal provisioning through xCAT(Extreme Cloud Administration Toolkit). As a result, the cloud virtualized systems, crashed virtualized servers, mis- platform could be deployed to provide both virtual configured virtual hosting platforms, performance tuning machines and bare metal machines. This paper firstly and erratic performance metrics, among others. introduces why bare metal machines are desirable in a cloud Consequently, we might want to run the compute jobs on platform, then it describes OpenStack briefly and also the "bare metal”: without a virtualization layer, Consider the xCAT driver, which makes xCAT work with the rest of the following cases: OpenStack platform in order to provision bare metal Case 1: Your OpenStack cloud environment contains machines to cloud end users. At the end, it presents a boards with Tilera processors (non-X86), and Tilera does performance comparison between a virtualized and bare- not currently support virtualization technologies like metal environment KVM.
    [Show full text]
  • Installing Conserver
    Installing Conserver version 1.0 David K. Z. Harris [email protected] Bryan Stansell [email protected] http://www.certaintysolutions.com/consoles/LISA2K-2.zip http://www.conserver.com/consoles/LISA2K-2.zip © 2000 Certainty Solutions, Inc. Pg. 1 This presentation is a supplement to my console services web pages located at http://www.certaintysolutions.com/consoles/LISA2K-2.zip. These pages have a substantial amount of information noted below each slide. We do this to help minimize the amount of note-taking that you need to do in class, and this should give you more time to listen to the instructors. If you feel that you learn better by taking notes, please feel free to do so. This presentation is meant to be a follow-up to a Basic Serial presentation. While this presentation can stand on its own, there is only a small amount of review of the earlier topic. During this tutorial, we will be discussing the topic of Console Servers as a generic application, but our technical emphasis will be on the Conserver application, which is freely available from http://www.conserver.com/. For most purposes in this tutorial, “Console Server” and “Conserver” can be used interchangeably. ©2000, David K. Z. Harris Certainty Solutions: Certainty in an uncertain world M12-2 v1.0 1 Pertinent Job History Ø Network Equipment Technologies ² (Comdesign, Bridge Communications) Ø Telebit Corp. Ø Cisco Systems, Inc. Ø Apple Computer, Inc. Ø Synopsys, Inc. Ø Global Networking & Computing ² (We’re now Certainty Solutions.) © 2000 Certainty Solutions, Inc. Pg. 2 Before moving into networking, David Harris was a hardware hacker, working in repair and R&D roles.
    [Show full text]
  • Xcat 2 Cookbook for Linux 8/7/2008 (Valid for Both Xcat 2.0.X and Pre-Release 2.1)
    xCAT 2 Cookbook for Linux 8/7/2008 (Valid for both xCAT 2.0.x and pre-release 2.1) Table of Contents 1.0 Introduction.........................................................................................................................................3 1.1 Stateless and Stateful Choices.........................................................................................................3 1.2 Scenarios..........................................................................................................................................4 1.2.1 Simple Cluster of Rack-Mounted Servers – Stateful Nodes....................................................4 1.2.2 Simple Cluster of Rack-Mounted Servers – Stateless Nodes..................................................4 1.2.3 Simple BladeCenter Cluster – Stateful or Stateless Nodes......................................................4 1.2.4 Hierarchical Cluster - Stateless Nodes.....................................................................................5 1.3 Other Documentation Available......................................................................................................5 1.4 Cluster Naming Conventions Used in This Document...................................................................5 2.0 Installing the Management Node.........................................................................................................6 2.1 Prepare the Management Node.......................................................................................................6
    [Show full text]
  • Torqueadminguide-5.1.0.Pdf
    Welcome Welcome Welcome to the TORQUE Adminstrator Guide, version 5.1.0. This guide is intended as a reference for both users and system administrators. For more information about this guide, see these topics: l Overview l Introduction Overview This section contains some basic information about TORQUE, including how to install and configure it on your system. For details, see these topics: l TORQUE Installation Overview on page 1 l Initializing/Configuring TORQUE on the Server (pbs_server) on page 10 l Advanced Configuration on page 17 l Manual Setup of Initial Server Configuration on page 32 l Server Node File Configuration on page 33 l Testing Server Configuration on page 35 l TORQUE on NUMA Systems on page 37 l TORQUE Multi-MOM on page 42 TORQUE Installation Overview This section contains information about TORQUE architecture and explains how to install TORQUE. It also describes how to install TORQUE packages on compute nodes and how to enable TORQUE as a service. For details, see these topics: l TORQUE Architecture on page 2 l Installing TORQUE on page 2 l Compute Nodes on page 7 l Enabling TORQUE as a Service on page 9 Related Topics Troubleshooting on page 132 TORQUE Installation Overview 1 Overview TORQUE Architecture A TORQUE cluster consists of one head node and many compute nodes. The head node runs the pbs_server daemon and the compute nodes run the pbs_mom daemon. Client commands for submitting and managing jobs can be installed on any host (including hosts not running pbs_server or pbs_mom). The head node also runs a scheduler daemon.
    [Show full text]
  • IBM Platform Computing Solutions Reference Architectures and Best Practices
    Front cover IBM Platform Computing Solutions Reference Architectures and Best Practices Helps with the foundation to manage enterprise environments Delivers reference architectures and best practices guides Provides case scenarios Dino Quintero Luis Carlos Cruz Ricardo Machado Picone Dusan Smolej Daniel de Souza Casali Gheorghe Tudor Joanna Wong ibm.com/redbooks International Technical Support Organization IBM Platform Computing Solutions Reference Architectures and Best Practices April 2014 SG24-8169-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (April 2014) This edition applies to RedHat 6.4, IBM Platform Cluster Manager Standard Edition (PCM-SE) 4.1.1, IBM Platform Symphony Advanced Edition 6.1.1, GPFS FPO 3.5.0.13, Hadoop 1.1.1. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . ix Comments welcome. ix Stay connected to IBM Redbooks . .x Chapter 1. Introduction. 1 1.1 Why IBM Platform Computing?. 2 1.2 High performance clusters . 2 1.3 IBM Platform HPC implementation scenario. 3 1.4 Big Data implementation on an IBM high performance computing cluster . 3 1.5 IBM Platform Computing solutions and products . 5 Intel . 7 Chapter 2. High performance clusters . 9 2.1 Cluster management. 10 2.1.1 IBM Platform HPC. 12 2.1.2 IBM Platform Cluster Manager Standard Edition . 19 2.1.3 IBM Platform Cluster Manager Advanced Edition.
    [Show full text]
  • An Empirical Study of the Effects of Open Source
    AN EMPIRICAL STUDY OF THE EFFECTS OF OPEN SOURCE ADOPTION ON SOFTWARE DEVELOPMENT ECONOMICS by Di Wu A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Applied Science in Technology Innovation Management Department of Systems and Computer Engineering, Carleton University Ottawa, Canada, K1S 5B6 March 2007 © Copyright 2007 Di Wu Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-27005-9 Our file Notre reference ISBN: 978-0-494-27005-9 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce,Canada de reproduire, publier, archiver, publish, archive, preserve, conserve,sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform,et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these.
    [Show full text]
  • Remote-Serial-Console-HOWTO.Pdf
    Remote Serial Console HOWTO Glen Turner Australian Academic and Research Network <[email protected]> Mark F. Komarinski <mkomarinskiATwayga.org> v2.6 2003−03−31 Revision History Revision 2.6 2003−03−31 Revised by: gdt Correct opposing CTS/RTS explanations. Use <quote> in markup. TLDP PDF is now good, so remove instructions for rendering PostScript to PDF. Typo in GRUB configuration. Revision 2.5 2003−01−20 Revised by: gdt Only one console per technology type. Setting timezone. Use off parameter rather than comments in inittab. Cable lengths. Revision 2.4 2002−10−03 Revised by: gdt Kernel flow control bug, more cabling, Debian, Livingston Portmaster, typos (especially those found during translation to Japanese). Revision 2.3 2002−07−11 Revised by: gdt Updates for Red Hat Linux 7.3, corrections to serial port speeds and UARTs, ioctlsave. Revision 2.2 2002−05−22 Revised by: gdt Minor changes Revision 2.1 2002−05−16 Revised by: gdt Corrections to kernel console syntax. Addition of USB and devfs. Revision 2.0 2002−02−02 Revised by: gdt Second edition. Revision d1.0 2001−03−20 Revised by: mfk First edition. An RS−232 serial console allows Linux to be controlled from a terminal or modem attached to an asynchronous serial port. The monitor, mouse and keyboard are no longer required for system administration. Serial consoles are useful where Linux systems are deployed at remote sites or are deployed in high−density racks. This HOWTO describes how to configure Linux to attach a serial console. Dedication Glen Turner would like to thank his family for allowing him to work on this project for the surprisingly large number of evenings which it took to write this HOWTO.
    [Show full text]
  • Kit Microsoft Dell Software Group
    Kit Microsoft Dell Software Group Kit de terrain Dell Software À propos de Dell Guide des solutions visant à accélérer l’adoption de la plateforme Microsoft Fonctionnalités Dell Software Processus de déploiements Microsoft avec Dell Plateformes technologiques Microsoft prises en charge Optimisation des grands enjeux Microsoft • Plateforme Cloud • Productivité Cloud et enterprise social • Informations métiers et mission critical Accélération de l’adoption de la plateforme Microsoft • Migration Windows Server • Migration de la messagerie électronique • SQL Server® • SharePoint® Notre engagement envers Microsoft Récompenses Contacts Partenaires - Confidentiel À propos de Dell Dell rend la technologie plus accessible et économique, améliorant ainsi la vie des individus, le fonctionnement des entreprises et la marche du monde. Aujourd’hui, nous exploitons la puissance du Cloud, de la technologie mobile, des Big Data et de la sécurité pour permettre à davantage d’individus d’en faire plus. Connexion des Intégration et Simplification Accélération de UTILISATEURS optimisation de et sécurisation via l’innovation via FINAUX l’ENTREPRISE les LOGICIELS les SERVICES Partenaires - Confidentiel Fonctionnalités Dell Software Gestion du Cloud Gestion de Gestion du et des datacenters l’information personnel mobile • Gestion des serveurs et des • Gestion des bases de données • Gestion des appareils mobiles systèmes clients • Business Intelligence / analytique • Virtualisation des postes de • Surveillance des performances • Intégration des données et des
    [Show full text]